Skip to main content

Retracted: Secure Conversation Using Cryptographic Algorithms in 3G Mobile Communication

  • Conference paper
Trends in Network and Communications (WeST 2011, NeCoM 2011, WiMoN 2011)

Abstract

Cryptographic algorithms used by Mobile Subscribers to protect the privacy of their cellular voice and data communication. Mobile network is the shared media. When media are shared, privacy and authentication are lost unless some method is established to regain it. Ciphering provides the mean to regain control over privacy and authentication. A5/x are the encryption algorithms used in order to ensure privacy of conversations on mobile phones. The strong version A5/1 is used in most countries. A5/2 is weaker version used in countries on which export restrictions apply. A5/3 encryption algorithm used for 3G and GEA3 encryption algorithm used for GPRS. f8 is confidentiality algorithms developed by 3GPP, bringing out the commonality between A5/3 and GEA3 algorithms. The following paper is based on simulation of A5/1, A5/3 and f8 algorithms.

An Erratum for this chapter can be found at http://dx.doi.org/10.1007/978-3-642-22543-7_76

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pandya, R.: Mobile and Personal Communication Systems and Service’s. IEEE Press, New York (2001)

    Google Scholar 

  2. Schneier, B.: Applied Cryptography. John Wiley & Sons Inc., New York (1996)

    MATH  Google Scholar 

  3. Feher, K.: Wireless Digital Communication - Modulation and Spread Spectrum Applications. Prentice Hall of India Private Ltd., New Delhi (2000)

    Google Scholar 

  4. Garg, V.K.: Wireless and Personal Communication System. Prentice Hall of India Private Ltd., New Delhi (1997)

    Google Scholar 

  5. Stallings, W.: Cryptography and Network Security. Prentice Hall, New Jersey (2006)

    Google Scholar 

  6. Haykin, S.: Communication System. In: 2001 Library of Congress in publication Cataloging Data, Singapore (2001)

    Google Scholar 

  7. Uylessblock: Wireless and personal communications system. PHI, New Delhi (2000)

    Google Scholar 

  8. Veni Madhavan, C.E., Saxena, P.K.: Recent Trends in Applied Cryptology. IETE Technical Review 20(2) (March-April 2003)

    Google Scholar 

  9. Briceno, M., Goldberg, I., Wagner, D.: A Pedagogical Implementation of the A5/1 (1999)

    Google Scholar 

  10. Technical specification of 3GPP TS 55.216 V6.2.0 (2003-2009)

    Google Scholar 

  11. Biham, E., Dunkelmna, O.: Cryptanalysis of the A5/1GSM stream Cipher (2000)

    Google Scholar 

  12. Anderson, R., Roe, M.: A5-The GSM Encryption Algorithm (1994)

    Google Scholar 

  13. Pitz, S., Schmitz, R., Martin, T.: Security mechanism in UMTS. Datenschutz and Datensicherheit (DUD) 25, 1–10 (2001)

    Google Scholar 

  14. Wei, L., Zibin, D., Longmei, N.: Research and Implementation of a High speed Reconfigurable A5 Algorithm. IEEE, Los Alamitos (2008)

    Book  Google Scholar 

  15. Huang, X., Shah, P.G., Sharma, D.: Protecting from Attacking the man-in-middle in wireless sensor Network with elliptic curve cryptography key exchange. In: 2010 Fourth International Conference on Network and System Security (2010)

    Google Scholar 

  16. Ahmed, F., Imran, M.: Cryptographic Analysis of GSM Network. IEEE, Los Alamitos (2009)

    Google Scholar 

  17. Ahmad, M., Izharuddin: Enhanced A5/1 Cipher with improved linear Complexity. IEEE, Los Alamitos (2009)

    Book  Google Scholar 

  18. Pitz, S., Schmitz, R., Martin, T.: Security mechanism in UMTS. Datenschutz and Datensicherheit (DUD) 25, 1–10 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sankaliya, A.R., Mishra, V., Mandloi, A. (2011). Retracted: Secure Conversation Using Cryptographic Algorithms in 3G Mobile Communication. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Trends in Network and Communications. WeST NeCoM WiMoN 2011 2011 2011. Communications in Computer and Information Science, vol 197. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22543-7_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22543-7_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22542-0

  • Online ISBN: 978-3-642-22543-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics